Kerberos: An Authentication Service for Open Network Systems

7
Kerberos: An Authentication Service for Open Network Systems J. G. Steiner, C. Neuman, J. I. Schiller

description

Kerberos: An Authentication Service for Open Network Systems. J. G. Steiner, C. Neuman, J. I. Schiller. What is Kerberos?. Trusted third-party authentication service Requirements: Secure(Private Key Encryption) Transparent (Tickets) Scalable (Replication) Reliable. - PowerPoint PPT Presentation

Transcript of Kerberos: An Authentication Service for Open Network Systems

Page 1: Kerberos:  An Authentication Service for Open Network Systems

Kerberos: An Authentication Service for Open Network Systems

J. G. Steiner, C. Neuman, J. I. Schiller

Page 2: Kerberos:  An Authentication Service for Open Network Systems

What is Kerberos?

• Trusted third-party authentication service

• Requirements:– Secure (Private Key Encryption)– Transparent (Tickets)– Scalable (Replication)– Reliable

Page 3: Kerberos:  An Authentication Service for Open Network Systems

Kerberos Authentication Protocols

Kerberos

Client

Server

TGS

Page 4: Kerberos:  An Authentication Service for Open Network Systems

Security

Page 5: Kerberos:  An Authentication Service for Open Network Systems

Transparency

• Tickets are reusable (authenticators are not)– {s,c,addr,timestamp,life,KS,C}KS

• Ticket-granting ticket can occur at login – (8 hour lease), kinit for new TGT

• Library calls: – krb_mk_req, krb_rd_req, krb_mk_prv, krb_rd_prv

Page 6: Kerberos:  An Authentication Service for Open Network Systems

Scalability & Reliability

• Slave (Read Only) Authentication Databases

• Master Kerberos DB used for (Write) Administration Requests– Entire DB is propagated every hour

• Common transactions can take place with replicated (Slave) servers

Page 7: Kerberos:  An Authentication Service for Open Network Systems

Open Issues & Questions

• Ticket Lifetime? (Short-term Playback)

• Integrity of workstation programs?

• Scalability between realms?

• Centralized authentication with Private-Key encryption advantages/disadvantages over Public-Key?